One Year After WannaCry: A Fundamentally Changed Threat Landscape
Threatpost talked to several security researchers about what's changed in the past year....
Critical Linux Flaw Opens the Door to Full Root Access
The vulnerability allows an attacker to execute a malware or other payloads on...
Phishing, spear phishing and whaling; does it change the price of phish?
The NCSC - in collaboration with CPNI - has recently published guidance on avoiding...
Avoid scoring a cyber security own goal this summer
This blog signposts to existing advice put together to answer any general...
Increased Cyber Threats: Security steps to take
This guidance outlines the security steps that your organisation should take in response...
Attackers Use UPnP to Sidestep DDoS Defenses
Universal Plug and Play networking protocols can be exploited to bypass DDoS mitigations....
Spray you, spray me: defending against password spraying attacks
One common way that online accounts are breached is through password spraying, whereby lists...
GDPR Phishing Scam Targets Apple Accounts, Financial Data
A phishing scam fooled victims by claiming to be Apple and scooping up...
Bugs in Logitech Harmony Hub Put Connected IoT Devices at ‘High Risk’
Researchers found an array of vulnerabilities in the Logitech Harmony Hub, shedding light...
Secrets of the Wiper: Inside the World’s Most Destructive Malware
The actors behind this kind of code, whether they’re bent on sending a...
Generic application development guidance
This guidance provides advice on how to minimise the loss of data from...
Apple iOS application development guidance
This guidance contains recommendations for the secure development, procurement and deployment of iOS applications. Please familiarise yourself with the generic application...
Google Project Zero Calls Windows 10 Edge Defense ‘ACG’ Flawed
Researchers maintain Microsoft’s vaunted Arbitrary Code Guard in the Edge browser can’t stop...
Application development collection
This guidance provides advice on how to minimise the loss of data from...
Android application development guidance
This guidance contains recommendations for the secure development, procurement and deployment of Android applications. Please familiarise yourself with the generic application...
Major OS Players Misinterpret Intel Docs, and Now Kernels Can Be Hijacked
Apple, Microsoft, Red Hat and others have built an uncannily similar privilege escalation...
Windows application developer guidance
This guidance contains recommendations for the secure development, procurement and deployment of Windows applications. Please familiarise yourself with the generic application...
The NCSC’s guide to developing, procuring and deploying applications
We've just updated our Application development guidance. In addition to the existing Android and...
“Equi-Facts”: Equifax Clarifies the Numbers for Its Massive Breach
As companies continue to install the vulnerable version of Apache Struts behind the...
FBI: Cyber-Fraud Losses Rise to Reach $1.4B
Tech-support scams took off during the year, while whaling/business email compromise was the...
Lenovo Patches Arbitrary Code Execution Flaw
Lenovo warns of a high-severity bug impacting its System x line of servers,...
EUD Security Guidance: macOS 10.13 High Sierra
This guidance was developed following testing performed on MacBook Pro and MacBook Air...
Report: Intel Facing New Spectre-Like Security Flaws
Intel may be facing as many as eight new Spectre-level vulnerabilities in its...
CyberFirst Girls’ talent showcased as the 2018 competition comes to a close
One of the best things about working on the CyberFirst Girls Competition is seeing the...
Twitter Urges Users to Change Passwords Due to Glitch
A glitch caused Twitter passwords to be stored in plain text on an...
Critical Cisco WebEx Bug Allows Remote Code Execution
Attackers can leverage the flaw by convincing users to open a file purported...
Free Speech Advocates Blast Amazon Over Threats Against Signal
Secure-messaging firm Signal was told by Amazon not to use its AWS servers...
Facebook Introduces ‘Clear History’ Option Amid Data Scandal
Facebook hopes to improve data privacy with a new feature letting users flush...
Millions of Home Fiber Routers Vulnerable to Complete Takeover
Exploitation can result in hackers gaining access to full browsing histories and all...
Volkswagen Cars Open To Remote Hacking, Researchers Warn
Vulnerable in-vehicle infotainment systems have left some Volkswagen cars open to remote hacking,...

